Login
Register
Dark Mode
Brightness
Profile
Edit Profile
Messages
My favorites
My Updates
Logout
Filter
Profile
Wall
Recent activity
All questions
All answers
Exams Taken
All Blogs
Recent activity by bharti
5
answers
1
MadeEasy Test Series 2018: Compiler Design - Left Recursion
I think the answer should be option: C but it is given option A. Providing the snapshot of the question with the options provided. I don't think option A should be the correct one, even if it then we cannot ... "bda" from option A which is possible in the original grammar. Please help with this question. Thanks in advance.
I think the answer should be option: C but it is given option A.Providing the snapshot of the question with the options provided.I don't think option A should be the corr...
1.6k
views
commented
Jan 26, 2018
Compiler Design
compiler-design
left-recursion
made-easy-test-series
+
–
3
answers
2
TIFR CSE 2012 | Part B | Question: 5
Let $R$ be a binary relation over a set $S$. The binary relation $R$ is called an equivalence relation if it is reflexive transitive and symmetric. The relation is called partial order if it is reflexive, transitive and anti symmetric. ... $\sqsubseteq $ is neither a partial order nor an equivalence relation.
Let $R$ be a binary relation over a set $S$. The binary relation $R$ is called an equivalence relation if it is reflexive transitive and symmetric. The relation is called...
2.0k
views
commented
Jan 16, 2018
Set Theory & Algebra
tifr2012
set-theory&algebra
partial-order
+
–
2
answers
3
Subnetting
Consider a router that interconnects three subnets: Subnet 1, Subnet 2 and Subnet 3. Suppose all of the interfaces in each of these three subnets are required to have the prefix 223.1.17/24. Also, subnet-1 is required to support upto 125 interfaces and subnet-2 and 3 are each required to support upto 60 interfaces Write a feasible set of subnet address / subnet mask pairs?
Consider a router that interconnects three subnets:Subnet 1, Subnet 2 and Subnet 3. Suppose all of the interfaces in each of these three subnets are requiredto have the p...
6.2k
views
answered
Jan 9, 2018
Computer Networks
computer-networks
subnetting
+
–
5
answers
4
GATE CSE 2014 Set 2 | Question: 27
An IP machine $Q$ has a path to another $IP\ machine\ H$ via three $IP\ routers \ R1, R2,$ and $R3$. $Q-R1-R2-R3-H$ $H$ acts as an $\text{HTTP}\ server$, and $Q$ connects to $H$ via $\text{HTTP}$ and downloads a file. Session layer ... $R2$ alone? Only $I1$ and $I2$ Only $I1$ Only $I2$ and $I3$ Only $I3$ and $I4$
An IP machine $Q$ has a path to another $IP\ machine\ H$ via three $IP\ routers \ R1, R2,$ and $R3$.$Q-R1-R2-R3-H$$H$ acts as an $\text{HTTP}\ server$, and $Q$ connects t...
14.8k
views
commented
Jan 9, 2018
Computer Networks
gatecse-2014-set2
computer-networks
network-security
normal
out-of-gate-syllabus
+
–
2
answers
5
test series
Identify the language : L1={ a^p b^q c^r / p<=q} L2 = {a^p b^q c^r / p>q } L3 = {a^p b^q c^r / q = r } where p ,q,r >= 0 then { L1 U L2 U L3 } is A. regular B.CFl but not Dcfl C. Cfl
Identify the language :L1={ a^p b^q c^r / p<=q}L2 = {a^p b^q c^r / p>q }L3 = {a^p b^q c^r / q = r } where p ,q,r >= 0then { L1 U L2 U L3 } is A. regular B.CFl bu...
927
views
answer selected
Jan 8, 2018
1
answer
6
throughput of pipeline
using a sequential implementation, it takes a total of 320 ns for each instruction, 300ns for combinational logic to complete and 20 ns to store result. This means that a throughput will be 3.12 millions instructions/second. assuming you ... .Assuming pipeline never starts, what will be the improvement in throughput? 2 instructions/sec 3 instructions/sec 4 instructions/sec
using a sequential implementation, it takes a total of 320 ns for each instruction, 300ns for combinational logic to complete and 20 ns to store result. This means that a...
1.5k
views
commented
Jan 3, 2018
2
answers
7
#DBMS What will be the Minimum Number of Tuples?
Say we have two relations R (a,b,c) and S (b,d,e). Now, R has 200 tuples and S has 300 tuples. What will be Minimum number of tuples when we do R ⋈ S ( ⋈ = Natural Join)?
Say we have two relations R (a,b,c) and S (b,d,e).Now, R has 200 tuples and S has 300 tuples. What will be Minimum number of tuples when we do R ⋈ S ( ⋈ = Natural Joi...
1.3k
views
answer edited
Dec 23, 2017
Databases
general
databases
relational-algebra
natural-join
joins
+
–
2
answers
8
Doubt Question on Transaction schedules
Consider a Serial Schedule given- T1 T2 T3 w1(A) w1(B) r2(A) w2(B) r3(A) w3(B) How many schedules which are view equivalent to above schedule? How many schedules which are confilct equivalent to above schedule? ... serializable/ view serializable? If yes How many serial schedules are possible which are conflict equivalent/ view equivalent to able schedule?
Consider a Serial Schedule given-T1T2T3w1(A) w1(B) r2(A) w2(B) r3(A) w3(B) How many schedules which are view equivalent to above schedule?How many schedules whic...
903
views
commented
Dec 23, 2017
Databases
databases
transaction-and-concurrency
view-serializable
conflict-serializable
+
–
1
answer
9
Binary tree
What is maximum possible height of BFS tree,if BSF is run on complete bipartisan graph Km,n where m>=1,n>=1 and starting vertex is S
What is maximum possible height of BFS tree,if BSF is run on complete bipartisan graph Km,n where m>=1,n>=1 and starting vertex is S
646
views
commented
Dec 22, 2017
1
answer
10
Linked List
Here In this question it is given that we have to perform nlogn decrease key operation and n find operation . 1)Finding an element in the linked list itself takes O(n) and there are N such operations total=O(n2). 2)Decrease key: Find key O(n) + O(1) for decrease=O(n) and there are nlogn such operations: total O(n2logn). Please correct Me : Image :
Here In this question it is given that we have to perform nlogn decrease key operation and n find operation .1)Finding an element in the linked list itself takes O(n) and...
1.2k
views
commented
Dec 21, 2017
DS
data-structures
linked-list
time-complexity
made-easy-test-series
+
–
4
answers
11
GATE IT 2006 | Question: 23
Let $P$, $Q$ and $R$ be sets let Δ denote the symmetric difference operator defined as $PΔQ=(P \cup Q) - (P ∩ Q).$ Using Venn diagrams, determine which of the following is/are TRUE? $PΔ (Q ∩ R) = (P Δ Q) ∩ (P Δ R)$ $P ∩ (Q ∩ R) = (P ∩ Q) Δ (P Δ R)$ I only II only Neither I nor II Both I and II
Let $P$, $Q$ and $R$ be sets let Δ denote the symmetric difference operator defined as $PΔQ=(P \cup Q) - (P ∩ Q).$ Using Venn diagrams, determine which of the followi...
5.8k
views
commented
Nov 30, 2017
Set Theory & Algebra
gateit-2006
set-theory&algebra
normal
set-theory
+
–
3
answers
12
Matrix chain multiplication
Which of the following is the recurrence relation for the matrix chain multiplication problem where p[i-1]*p[i] gives the dimension of the i^th matrix? dp[i,j]=1 if i=j dp[i,j]=min{dp[i,k]+dp[k+1,j]} dp[i,j]=1 if i=j dp[i,j]=min{dp[i,k]+dp[k+1,j]}+p[i-1]*p[k]*p[j] dp[i,j]= ... dp[i,j]=min{dp[i,k]+dp[k+1,j]} dp[i,j]=0 if i=j dp[i,j]=min{dp[i,k]+dp[k+1,j]}+p[i-1]*p[k]*p[j]
Which of the following is the recurrence relation for the matrix chain multiplication problem where p[i-1]*p[i] gives the dimension of the i^th matrix? dp[i,j]=1 if i=jd...
4.3k
views
commented
Nov 27, 2017
Algorithms
dynamic-programming
algorithms
matrix-chain-ordering
+
–
1
answer
13
data base 2
477
views
commented
Nov 22, 2017
Databases
databases
b-tree
indexing
+
–
2
answers
14
GATE CSE 2008 | Question: 36
Which of the following are NOT true in a pipelined processor? Bypassing can handle all RAW hazards Register renaming can eliminate all register carried WAR hazards Control hazard penalties can be eliminated by dynamic branch prediction I and II only I and III only II and III only I, II and III
Which of the following are NOT true in a pipelined processor?Bypassing can handle all RAW hazardsRegister renaming can eliminate all register carried WAR hazardsControl h...
22.1k
views
commented
Nov 17, 2017
CO and Architecture
gatecse-2008
pipelining
co-and-architecture
normal
+
–
2
answers
15
GATE CSE 2004 | Question: 67
The microinstructions stored in the control memory of a processor have a width of $26$ bits. Each microinstruction is divided into three fields: a micro-operation field of $13$ bits, a next address field $(X),$ and a MUX select field $(Y).$ There are $8$ status bits in the ... of the control memory in number of words? $10, 3, 1024$ $8, 5, 256$ $5, 8, 2048$ $10, 3, 512$
The microinstructions stored in the control memory of a processor have a width of $26$ bits. Each microinstruction is divided into three fields: a micro-operation field o...
13.6k
views
commented
Nov 10, 2017
CO and Architecture
gatecse-2004
co-and-architecture
microprogramming
normal
+
–
3
answers
16
GATE CSE 1993 | Question: 10
The instruction format of a CPU is: $\text{Mode}$ and $\text{RegR}$ together specify the operand. $\text{RegR}$ specifies a CPU register and $\text{Mode}$ specifies an addressing mode. In particular, $\text{Mode}=2$ specifies that ... address of the operand? Assuming that is a non-jump instruction, what are the contents of PC after the execution of this instruction?
The instruction format of a CPU is:$\text{Mode}$ and $\text{RegR}$ together specify the operand. $\text{RegR}$ specifies a CPU register and $\text{Mode}$ specifies an add...
7.2k
views
commented
Oct 29, 2017
CO and Architecture
gate1993
co-and-architecture
addressing-modes
normal
descriptive
+
–
7
answers
17
GATE CSE 2014 Set 2 | Question: 37
Consider two strings $A$="qpqrr" and $B$="pqprqrp". Let $x$ be the length of the longest common subsequence (not necessarily contiguous) between $A$ and $B$ and let $y$ be the number of such longest common subsequences between $A$ and $B$. Then $x +10y=$ ___.
Consider two strings $A$="qpqrr" and $B$="pqprqrp". Let $x$ be the length of the longest common subsequence (not necessarily contiguous) between $A$ and $B$ and let $y$ b...
16.9k
views
commented
Oct 29, 2017
Algorithms
gatecse-2014-set2
algorithms
normal
numerical-answers
dynamic-programming
+
–
1
answer
18
Number of WAR
Number of WAR dependencies possible R1 <- R3 + R2 R3 <- R3 + R5 R3 <- R2 + R3 Is it 2 or 3?
Number of WAR dependencies possibleR1 <- R3 + R2R3 <- R3 + R5R3 <- R2 + R3Is it 2 or 3?
592
views
commented
Oct 26, 2017
CO and Architecture
data-dependency
+
–
1
answer
19
compiler
S->SAS | a A->AA | b is the grammar a) LR(0) b)SLR(1) c)LALR(1) d)none
S->SAS | aA->AA | bis the grammara) LR(0)b)SLR(1)c)LALR(1)d)none
338
views
answered
Oct 21, 2017
Compiler Design
compiler-design
parsing
lr-parser
+
–
1
answer
20
Multilevel Pagetable
Ques. On a System with 32 bit address and 4KB pages how many levels are required in multilevel page table(assuming page table entry is of 4 bytes of storage)? (A). 2 (B). 3 (C). 1 (D) None plz explain the solution
Ques. On a System with 32 bit address and 4KB pages how many levels are required in multilevel page table(assuming page table entry is of 4 bytes of storage)?(A). 2(B). 3...
3.4k
views
commented
Oct 21, 2017
CO and Architecture
multilevel
paging
+
–
4
answers
21
GATE IT 2006 | Question: 14
Consider the relations $r_{1}\text{(P, Q, R)}$ and $r_{2}\text{(R, S, T)}$ with primary keys $\text{P}$ and $\text{R}$ respectively. The relation $r_{1}$ contains $2000$ tuples and $r_{2}$ contains $2500$ tuples. The maximum size of the join $r_1⋈ r_2$ is : $2000$ $2500$ $4500$ $5000$
Consider the relations $r_{1}\text{(P, Q, R)}$ and $r_{2}\text{(R, S, T)}$ with primary keys $\text{P}$ and $\text{R}$ respectively. The relation $r_{1}$ contains $2000$ ...
17.4k
views
commented
Oct 18, 2017
Databases
gateit-2006
databases
joins
natural-join
normal
+
–
2
answers
22
Block Nested Loop Join
Consider a relation R with 2000 records and relation S with 500 records. Size of each record is 5 Byte and block size is 100 Byte, then minimum number of block access that are needed block nested loop join. I think its answer should be 2525.
Consider a relation R with 2000 records and relation S with 500 records. Size of each record is 5 Byte and block size is 100 Byte, then minimum number of block access tha...
1.4k
views
commented
Oct 17, 2017
Databases
databases
natural-join
block-nested-loop-join
+
–
2
answers
23
MadeEasy Workbook: Theory of Computation - Finite Automata
Any given transition diagram has an equivalent a) regular expression b) NDFSM c) DFSM d) all of these
Any given transition diagram has an equivalenta) regular expressionb) NDFSMc) DFSMd) all of these
861
views
answered
Oct 7, 2017
Theory of Computation
theory-of-computation
finite-automata
made-easy-booklet
+
–
5
answers
24
TIFR CSE 2014 | Part B | Question: 16
Consider the ordering relation $x\mid y \subseteq N \times N$ over natural numbers $N$ such that $x \mid y$ if there exists $z \in N$ such that $x ∙ z = y$. A set is called lattice if every finite subset has a least upper bound and greatest lower ... $(N, \mid)$ is a complete lattice. $(N, \mid)$ is a lattice but not a complete lattice.
Consider the ordering relation $x\mid y \subseteq N \times N$ over natural numbers $N$ such that $x \mid y$ if there exists $z \in N$ such that $x ∙ z = y$. A set is ca...
5.2k
views
commented
Oct 4, 2017
Set Theory & Algebra
tifr2014
set-theory&algebra
partial-order
lattice
+
–
5
answers
25
GATE CSE 2005 | Question: 23
Packets of the same session may be routed through different paths in: TCP, but not UDP TCP and UDP UDP, but not TCP Neither TCP nor UDP
Packets of the same session may be routed through different paths in:TCP, but not UDPTCP and UDPUDP, but not TCPNeither TCP nor UDP
19.6k
views
commented
Sep 29, 2017
Computer Networks
gatecse-2005
computer-networks
tcp
udp
easy
+
–
4
answers
26
GATE CSE 2002 | Question: 2.20
Dynamic linking can cause security concerns because Security is dynamic The path for searching dynamic libraries is not known till runtime Linking is insecure Cryptographic procedures are not available for dynamic linking
Dynamic linking can cause security concerns becauseSecurity is dynamicThe path for searching dynamic libraries is not known till runtimeLinking is insecureCryptographic p...
6.9k
views
commented
Sep 13, 2017
Operating System
gatecse-2002
operating-system
runtime-environment
easy
+
–
4
answers
27
GATE IT 2007 | Question: 58
A demand paging system takes $100$ time units to service a page fault and $300$ time units to replace a dirty page. Memory access time is $1$ time unit. The probability of a page fault is $p$ ... that the average access time is $3$ time units. Then the value of $p$ is $0.194$ $0.233$ $0.514$ $0.981$
A demand paging system takes $100$ time units to service a page fault and $300$ time units to replace a dirty page. Memory access time is $1$ time unit. The probability o...
22.8k
views
commented
Sep 12, 2017
Operating System
gateit-2007
operating-system
page-replacement
probability
normal
+
–
3
answers
28
GATE CSE 1999 | Question: 2.23
A certain processor supports only the immediate and the direct addressing modes. Which of the following programming language features cannot be implemented on this processor? Pointers Arrays Records Recursive procedures with local variable
A certain processor supports only the immediate and the direct addressing modes. Which of the following programming language features cannot be implemented on this proces...
15.5k
views
commented
Sep 11, 2017
CO and Architecture
gate1999
co-and-architecture
addressing-modes
normal
multiple-selects
+
–
2
answers
29
GATE CSE 2001 | Question: 1.8
Which of the following statements is false? Virtual memory implements the translation of a program's address space into physical memory address space Virtual memory allows each program to exceed the size of the primary memory Virtual memory increases the degree of multiprogramming Virtual memory reduces the context switching overhead
Which of the following statements is false?Virtual memory implements the translation of a program's address space into physical memory address spaceVirtual memory allows ...
21.5k
views
commented
Sep 8, 2017
Operating System
gatecse-2001
operating-system
virtual-memory
normal
+
–
4
answers
30
GATE IT 2008 | Question: 71
A Binary Search Tree (BST) stores values in the range $37$ to $573$. Consider the following sequence of keys. $81, 537, 102, 439, 285, 376, 305$ $52, 97, 121, 195, 242, 381, 472$ $142, 248, 520, 386, 345, 270, 307$ ... list nodes in the order in which we could have encountered them in the search? II and III only I and III only III and IV only III only
A Binary Search Tree (BST) stores values in the range $37$ to $573$. Consider the following sequence of keys.$81, 537, 102, 439, 285, 376, 305$$52, 97, 121, 195, 242, 381...
14.7k
views
commented
Sep 7, 2017
DS
gateit-2008
data-structures
binary-search-tree
normal
+
–
Email or Username
Show
Hide
Password
I forgot my password
Remember
Log in
Register